CVE-2023-54177
Warning Trigger in Linux Kernel Quota Subsystem Due to Reference Count Handling
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.3.0-next-20230505 |
| linux | linux_kernel | 6.3.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a warning in the Linux kernel logs related to quota operations, specifically a WARN_ON_ONCE triggered in dqgrab() when the DQ_ACTIVE_B flag is not set in dquot->dq_flags. To detect this vulnerability on your system, you should monitor the kernel logs for warnings containing 'dquot_disable', 'dqgrab', or messages similar to 'WARNING: CPU: ... dquot_disable+0x13b7/0x18c0'. You can use the following commands to check for such warnings: 1) sudo dmesg | grep -i dquot 2) sudo journalctl -k | grep -i dquot 3) sudo dmesg | grep -i dqgrab 4) sudo journalctl -k | grep -i dqgrab These commands will help identify if the kernel has logged warnings related to this issue.
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's quota subsystem, specifically in the dqgrab() function. During fault injection testing, a warning occurs due to improper handling of quota references when the DQ_ACTIVE_B flag is not set on dquot->dq_flags. The issue arises when dqgrab() is called in invalidate_dquots(), triggering a warning because the expected flag is not set. The fix replaces dqgrab() with an atomic increment of the dquot reference count to prevent this warning and ensure proper quota handling.
How can this vulnerability impact me? :
This vulnerability can cause warnings and potential instability in the Linux kernel's quota management during certain operations like remounting filesystems with quotas enabled. While it may not directly lead to security breaches, it can affect system reliability and stability when quota operations are performed, possibly impacting filesystem behavior and administrative tasks.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by replacing the dqgrab() use in invalidate_dquots() with atomic_inc(&dquot->dq_count). To mitigate this vulnerability, update your Linux kernel to a version that includes this fix.